PDF Archive

Easily share your PDF documents with your contacts, on the Web and Social Networks.

Share a file Manage my documents Convert Recover PDF Search Help Contact



Security Features in Android Smartphones .pdf



Original filename: Security Features in Android Smartphones.pdf
Title: Slide 1
Author: SEO1

This PDF 1.5 document has been generated by Microsoft® Office PowerPoint® 2007, and has been sent on pdf-archive.com on 27/04/2017 at 13:02, from IP address 182.156.x.x. The current document download page has been viewed 160 times.
File size: 1.3 MB (14 pages).
Privacy: public file




Download original PDF file









Document preview


Security Features in Android Smartphones

Smartphones have
become a basic necessity
of modern living.

Hackers use different
methods to access
sensitive information that
many people store on
their phones and Android
app developers are
working hard to build a
secured app.

A) Built-In Security

1) Phone tracking with android device
manager

Being able to remotely access your device
helps to improve security. You don’t have to
install a third party app to track your phone
remotely. It allows you to lock, locate, ring
and wipe your device remotely.

2) Screen Lock

Android provides various ways to lock your
phone. These include the use of a pin,
password, face unlock or pattern.
Unfortunately, about 39% of smartphone
users don’t make use of any of these security
locking features.

3) Add contact info to your lock screen

You can add emergency contacts and other
contact information on your lock screen by
going to settings> security and then selecting
owner info.

4) Phone encryption

If you’re planning to sell your phone,
encryption is something that you definitely
should do. However, it is something that can
also help to improve security even for daily
usage.

5) Two-factor authentication

This isn’t just for your phone but also for your Google
account and therefore all Google products that you
access with your account.


Related documents


security features in android smartphones
forensic recovery of scrambled telephones
parallels remote application server
challenges confronted while deploying enterprise1298
mobile implants
kryptovoip encrypted software


Related keywords